diff --git a/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivateDeactivatePartnerApiKey.yml b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivatePartnerApiKey.yml similarity index 100% rename from apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivateDeactivatePartnerApiKey.yml rename to apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/ActivatePartnerApiKey.yml diff --git a/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml new file mode 100644 index 0000000000..52221c5ac7 --- /dev/null +++ b/apitest/src/main/resources/pms/ActivateDeactivatePartnerApiKey/DeactivatePartnerApiKey.yml @@ -0,0 +1,19 @@ +ActivateDeactivatePartnerApiKey: + Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke: + endPoint: /v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status + role: partnerrevamp + description: Deactivating Partner API Key + checkErrorsOnlyInResponse: true + restMethod: patch + inputTemplate: pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey + outputTemplate: pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult + input: '{ + "partnerId": "111999", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "label": "string", + "requesttime": "$TIMESTAMP$", + "status": "De-Active" +}' + output: '{ + "response": "Partner apikey de-activated successfully." +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml b/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml index 681a04247c..237e39b415 100644 --- a/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml +++ b/apitest/src/main/resources/pms/GetAllActivePolicyGroups/GetAllActivePolicyGroups.yml @@ -1,7 +1,7 @@ GetAllActivePolicyGroups: Pms_GetAllActivePolicyGroups_All_Valid_Smoke: endPoint: /v1/policymanager/policies/getAllPolicyGroups - description: Fetching all the activated PolicyGroups + description: Fetching all the active PolicyGroups role: partnerrevamp checkErrorsOnlyInResponse: true restMethod: get @@ -10,4 +10,38 @@ GetAllActivePolicyGroups: input: '{ }' output: ' { +}' + Pms_GetAllActivePolicyGroups_without_auth: + endPoint: /v1/policymanager/policies/getAllPolicyGroups + description: Fetching all the active PolicyGroups without token + role: batch + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllActivePolicyGroups/getAllActivePolicyGroups + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllActivePolicyGroups_Invalid_auth: + endPoint: /v1/policymanager/policies/getAllPolicyGroups + description: Fetching all the active PolicyGroups with invalid token + role: regproc + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllActivePolicyGroups/getAllActivePolicyGroups + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] }' diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml index f4e66ea152..81d3717e21 100644 --- a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml +++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner/GetAllApiKeyForAuthPartner.yml @@ -1,7 +1,7 @@ GetAllApiKeyForAuthPartner: Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke: endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners - description: Fetching all the API Key available for Auth Partners + description: Fetching all the API Key available for Auth Partner role: partnerrevamp checkErrorsOnlyInResponse: true restMethod: get @@ -9,5 +9,39 @@ GetAllApiKeyForAuthPartner: outputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult input: '{ }' - output: ' { + output: '{ +}' + Pms_GetAllApiKeyForAuthPartner_without_auth: + endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners + description: Fetching all the API Key available for Auth Partner without token + role: batch + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllApiKeyForAuthPartner_invalid_auth: + endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners + description: Fetching all the API Key available for Auth Partner with invalid token + role: regproc + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml new file mode 100644 index 0000000000..f640885a5c --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/GetAllApiKeyForAuthPartnernegativescenario.yml @@ -0,0 +1,19 @@ +GetAllApiKeyForAuthPartner: + Pms_GetAllApiKeyForAuthPartner: + endPoint: /v1/partnermanager/partners/getAllApiKeysForAuthPartners + description: Fetching all the API Key available for Auth Partner + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner + outputTemplate: pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_CERTIFICATE_ERROR_002" + } + ] +}' + diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs new file mode 100644 index 0000000000..7a73a41bfd --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnerResultnegativescenario.hbs @@ -0,0 +1,2 @@ +{ +} \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs new file mode 100644 index 0000000000..7a73a41bfd --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllApiKeyForAuthPartner2/getAllApiKeyForAuthPartnernegativescenario.hbs @@ -0,0 +1,2 @@ +{ +} \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml index 56b322c9b2..d6744c58a4 100644 --- a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml +++ b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicy.yml @@ -9,5 +9,5 @@ GetAllApprovedAuthPartnerPolicy: outputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult input: '{ }' - output: ' { -}' \ No newline at end of file + output: '{ +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml new file mode 100644 index 0000000000..7fb8d40411 --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllApprovedAuthPartnerPolicy/GetAllApprovedAuthPartnerPolicyNegativeScenarios.yml @@ -0,0 +1,35 @@ +GetAllApprovedAuthPartnerPolicy: + Pms_GetAllApprovedAuthPartnerPolicy_without_auth: + endPoint: /v1/partnermanager/partners/getAllApprovedAuthPartnerPolicies + description: Fetching all Approved Auth Partner Policies without token + role: batch + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth: + endPoint: /v1/partnermanager/partners/getAllApprovedAuthPartnerPolicies + description: Fetching all Approved Auth Partner Policies with invalid token + role: regproc + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml index 053749050a..72fcdd69c6 100644 --- a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml +++ b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerId.yml @@ -9,4 +9,9 @@ GetAllApprovedPartnerId: input: '{ }' output: '{ + "errors": [ + { + "errorCode": "PMS_CERTIFICATE_ERROR_002" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml new file mode 100644 index 0000000000..7d9a241d36 --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllApprovedPartnerId/GetAllApprovedPartnerIdNegativeScenarios.yml @@ -0,0 +1,33 @@ +GetAllApprovedPartnerId: + Pms_GetAllApprovedPartnerId_without_auth: + endPoint: /v1/partnermanager/partners/getAllApprovedPartnerIdsWithPolicyGroups + description: Fetching all approved Partner Id without token + role: batch + restMethod: get + inputTemplate: pms/GetAllApprovedPartnerId/getAllApprovedPartnerId + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllApprovedPartnerId_invalid_auth: + endPoint: /v1/partnermanager/partners/getAllApprovedPartnerIdsWithPolicyGroups + description: Fetching all approved Partner Id with invalid token + role: regproc + restMethod: get + inputTemplate: pms/GetAllApprovedPartnerId/getAllApprovedPartnerId + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml index 2520010ebb..3bda9b462d 100644 --- a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml +++ b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificate.yml @@ -1,7 +1,7 @@ GetAllCertificate: Pms_GetAllCertificate_allValid_smoke: endPoint: /v1/partnermanager/partners/getAllCertificateDetails - description: Fetching all the API certificates of the Loggedin Partner + description: Fetching all the API certificates of the Logged in Partner role: partnerrevamp restMethod: get inputTemplate: pms/GetAllCertificate/getAllCertificate @@ -27,4 +27,36 @@ GetAllCertificate: "partnerID": "111996", "partnerType": "Auth_Partner", "isCertificateAvailable": true +}' + Pms_GetAllCertificate_without_auth: + endPoint: /v1/partnermanager/partners/getAllCertificateDetails + description: Fetching all the API certificates of the partner without login + role: batch + restMethod: get + inputTemplate: pms/GetAllCertificate/getAllCertificate + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllCertificate_invalid_auth: + endPoint: /v1/partnermanager/partners/getAllCertificateDetails + description: Fetching all the API certificates of the partner invalid partner + role: regproc + restMethod: get + inputTemplate: pms/GetAllCertificate/getAllCertificate + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml new file mode 100644 index 0000000000..02abf19880 --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllCertificate/GetAllCertificateNegativeScenarios.yml @@ -0,0 +1,17 @@ +GetAllCertificate: + Pms_GetAllCertificate_beforecertifiactes_upload: + endPoint: /v1/partnermanager/partners/getAllCertificateDetails + description: Fetching all the API certificates of the Logged in Partner + role: partnerrevamp + restMethod: get + inputTemplate: pms/GetAllCertificate/getAllCertificate + outputTemplate: pms/error + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_CERTIFICATE_ERROR_002" + } + ] +}' diff --git a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml index ba34aef681..efa27fca6a 100644 --- a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml +++ b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClient.yml @@ -9,5 +9,10 @@ GetAllOidcClient: outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult input: '{ }' - output: ' { + output: '{ + "errors": [ + { + "errorCode": "PMS_CERTIFICATE_ERROR_002" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml new file mode 100644 index 0000000000..71902d8c4d --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllOidcClient/GetAllOidcClientNegativeScenarios.yml @@ -0,0 +1,35 @@ +GetAllOidcClient: + Pms_GetAllOidcClient_without_Auth: + endPoint: /v1/partnermanager/getAllOidcClients + description: Fetching all OIDC Clients of the loggedin Partner + role: batch + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllOidcClient/getAllOidcClient + outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllOidcClient_Invalid_Auth: + endPoint: /v1/partnermanager/getAllOidcClients + description: Fetching all OIDC Clients of the loggedin Partner + role: regproc + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllOidcClient/getAllOidcClient + outputTemplate: pms/GetAllOidcClient/getAllOidcClientResult + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml b/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml new file mode 100644 index 0000000000..e0e89cc6bf --- /dev/null +++ b/apitest/src/main/resources/pms/GetAllRequestedPolicy/GetAllRequestedPolicyNegativeScenarios.yml @@ -0,0 +1,35 @@ +GetAllRequestedPolicies: + Pms_GetAllRequestedPolicies_without_auth: + endPoint: /v1/partnermanager/partners/getAllRequestedPolicies + description: Fetching all the Requested Policies without login token + role: batch + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicy + outputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicyResult + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_GetAllRequestedPolicies_invalid_auth: + endPoint: /v1/partnermanager/partners/getAllRequestedPolicies + description: Fetching all the Requested Policies with invalid role + role: regproc + checkErrorsOnlyInResponse: true + restMethod: get + inputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicy + outputTemplate: pms/GetAllRequestedPolicy/getAllRequestedPolicyResult + input: '{ +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml b/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml index 18ac50500b..f0354408b9 100644 --- a/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml +++ b/apitest/src/main/resources/pms/OIDCClient/OIDCClient.yml @@ -21,4 +21,238 @@ CreateOIDCClient: output: '{ "clientId": "$IGNORE$", "status": "ACTIVE" +}' + Pms_CreateOIDCClient_invalid_policyID: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client with invalid policyid + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89767", + "policyId": "fgdggh", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_PRT_073" + } + ] +}' + Pms_CreateOIDCClient_invalid_logoUri: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client with invalid logoUri + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] +}' + Pms_CreateOIDCClient_invalid_RedirectUri: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client with invalid redirectUri + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$abcdefg", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "invalid_redirect_uri" + } + ] +}' + Pms_CreateOIDCClient_invalid_auth: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client without token + role: regproc + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] +}' + Pms_CreateOIDCClient_without_publickey: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client without publickkey + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$REMOVE$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_00" + } + ] +}' + Pms_CreateOIDCClient_invalid_granttypes: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client with invalid granttypes + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "hghghgg", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "invalid_grant_type" + } + ] +}' + Pms_CreateOIDCClient_without_granttypes: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client without granttypes + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "$REMOVE$", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] +}' + Pms_CreateOIDCClient_without_name: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client without name field + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "$REMOVE$", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "$JWKKEY$", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] +}' + Pms_CreateOIDCClient_invalid_publickey: + endPoint: /v1/partnermanager/oauth/client + description: Creating OAUTH Client with invalid publickkey + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/OIDCClient/oIDCClient + outputTemplate: pms/error + input: '{ + "requestTime": "$TIMESTAMP$", + "name": "OIDC TEST CLIENT 89766", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "publicKey": "dhghfgfyt", + "authPartnerId": "111999", + "logoUri": "https://health-services.com/logo.png", + "redirectUris": "$IDPREDIRECTURI$", + "grantTypes": "authorization_code", + "clientAuthMethods": "private_key_jwt" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml b/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml index ba4342fe70..17a207c1fa 100644 --- a/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml +++ b/apitest/src/main/resources/pms/OIDCClient/UpdateOIDCClient.yml @@ -3,7 +3,7 @@ UpdateOIDCClient: endPoint: /v1/partnermanager/oauth/client/{client_id} role: partnerrevamp checkErrorsOnlyInResponse: true - restMethod: post + restMethod: put inputTemplate: pms/OIDCClient/oIDCClientUpdate outputTemplate: pms/OIDCClient/oIDCClientResult input: '{ diff --git a/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml b/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml index 9bdb042175..47cc3b7fc5 100644 --- a/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml +++ b/apitest/src/main/resources/pms/PublishPolicy/PublishPolicy.yml @@ -26,4 +26,92 @@ createPublishPolicy: "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" - }' \ No newline at end of file + }' + + + Pms_PublishPolicy_InValid_AlreadyPublished: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish + description: Publish The Policy which is already published + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/PublishPolicy/publishPolicy + outputTemplate: pms/error + input: '{ + "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_POL_020" + } + ] + }' + + Pms_PublishPolicy_InValid_policygroupId: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish + description: Publish The Policy with invalid policygroupid + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/PublishPolicy/publishPolicy + outputTemplate: pms/error + input: '{ + "policygroupId": "sgdasfgbv", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_POL_016" + } + ] + }' + + Pms_PublishPolicy_InValid_policyId: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish + description: Publish The Policy with invalid policyid + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/PublishPolicy/publishPolicy + outputTemplate: pms/error + input: '{ + "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "policyId": "afgrwfg", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_POL_008" + } + ] + }' + + Pms_PublishPolicy_invalid_auth: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId}/publish + description: Publish The Policy without access token + role: regproc + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/PublishPolicy/publishPolicy + outputTemplate: pms/error + input: '{ + "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-403" + } + ] + }' + + + \ No newline at end of file diff --git a/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml b/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml index 33df0d54a5..965a9fba73 100644 --- a/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml +++ b/apitest/src/main/resources/pms/UpdatePolicyStatus/UpdatePolicyStatus.yml @@ -1,5 +1,5 @@ UpdatePolicyStatus: - Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke: + Pms_UpdatePolicyStatus_Active_auth_All_Valid_Smoke: endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} description: Update Policy Status role: partnerrevamp @@ -14,4 +14,122 @@ UpdatePolicyStatus: }' output: ' { "message": "status updated successfully" - }' \ No newline at end of file + }' + + Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/UpdatePolicyStatus/updatePolicyStatusResult + input: '{ + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "status":"De-Active", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "message": "status updated successfully" + }' + + Pms_UpdatePolicyStatus_Active_InValid: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/error + input: '{ + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "status":"De-Active", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_POL_054", + "message": "Cannot activate unpublished policy." + } + ] + }' + + Pms_UpdatePolicyStatus_PolicyId_InValid: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/error + input: '{ + "policyId": "asfgv", + "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "status":"De-Active", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_POL_008", + "message": "Policy ID does not exist" + } + ] + }' + + Pms_UpdatePolicyStatus_status_InValid: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/error + input: '{ + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "status":"asfg", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_POL_045" + } + ] + }' + + Pms_UpdatePolicyStatus_PolicyGroupId_InValid: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/error + input: '{ + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "policygroupId":"asfbvef", + "status":"Active", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_POL_016" + } + ] + }' + + Pms_UpdatePolicyStatus_Missing_status_InValid: + endPoint: /v1/policymanager/policies/{policyId}/group/{policygroupId} + role: partnerrevamp + restMethod: patch + inputTemplate: pms/UpdatePolicyStatus/updatePolicyStatus + outputTemplate: pms/error + input: '{ + "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", + "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", + "status":"$REMOVE$", + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_COR_003" + } + ] + }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml b/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml index 3b2fa087b8..26289bc656 100644 --- a/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml +++ b/apitest/src/main/resources/pms/UploadCACertificate/UploadCACertificate.yml @@ -52,4 +52,58 @@ UploadCACertificate: "requesttime": "$TIMESTAMP$" }' output: ' { +}' + Pms_UploadCACertificate_UploadAgain_All_Valid_Smoke: + endPoint: /v1/partnermanager/partners/certificate/ca/upload + description: Upload CA Cert which is already uploaded + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/UploadCACertificate/uploadCertificate2 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" + }' + output: ' { + "errors": [ + { + "errorCode": "KER-PCM-003" + } + ] +}' + Pms_UploadCACertificate_with_invalid_data: + endPoint: /v1/partnermanager/partners/certificate/ca/upload + description: Upload CA Cert with invalid data + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/UploadCACertificate/uploadCertificate3 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" + }' + output: ' { + "errors": [ + { + "errorCode": "KER-CRY-003" + } + ] +}' + Pms_UploadCACertificate_with_blank_data: + endPoint: /v1/partnermanager/partners/certificate/ca/upload + description: Upload CA Cert with blank data + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/UploadCACertificate/uploadCertificate4 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" + }' + output: ' { + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml b/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml index 5ad69bc2dd..eaf605ea01 100644 --- a/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml +++ b/apitest/src/main/resources/pms/UploadPartnerCert/UploadPartnerCert.yml @@ -25,4 +25,68 @@ uploadPartnerCert: "requesttime": "$TIMESTAMP$" }' output: ' { -}' \ No newline at end of file +}' + + Pms_UploadPartnerCert_missing_PartnerDomain: + endPoint: /v1/partnermanager/partners/certificate/upload + description: Upload Partner Cert without partnerdomain + role: partnerrevamp + restMethod: post + inputTemplate: pms/UploadPartnerCert/uploadCert2 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] +}' + Pms_UploadPartnerCert_invalid_certificate: + endPoint: /v1/partnermanager/partners/certificate/upload + description: Upload Partner Cert by giving invalid cert data + role: partnerrevamp + restMethod: post + inputTemplate: pms/UploadPartnerCert/uploadCert3 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "KER-KMS-013" + } + ] +}' + Pms_UploadPartnerCert_invalid_Domain: + endPoint: /v1/partnermanager/partners/certificate/upload + description: Upload Partner Cert by giving invalid domain + role: partnerrevamp + restMethod: post + inputTemplate: pms/UploadPartnerCert/uploadCert4 + outputTemplate: pms/error + input: '{ + "requesttime": "$TIMESTAMP$" +}' + output: ' { + "errors": [ + { + "errorCode": "KER-PCM-011" + } + ] +}' + Pms_UploadPartnerCert_UploadAgain_All_Valid_Smoke: + endPoint: /v1/partnermanager/partners/certificate/upload + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/UploadPartnerCert/uploadCert + outputTemplate: pms/UploadPartnerCert/uploadCertResult + input: '{ + "requesttime": "$TIMESTAMP$" +}' + output: ' { +}' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml b/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml index 9b6753794e..c0bcd8a717 100644 --- a/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml +++ b/apitest/src/main/resources/pms/VerifyPartnersEmail/VerifyPartnersEmail.yml @@ -42,4 +42,55 @@ VerifyPartnersEmail: }' output: '{ "emailExists": true +}' + Pms_VerifyPartnersEmail_without_auth: + endPoint: /v1/partnermanager/partners/email/verify + role: batch + restMethod: put + inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail + outputTemplate: pms/error + input: '{ + "emailId": "mosip98763@gmail.com", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "KER-ATH-401" + } + ] +}' + Pms_VerifyPartnersEmail_missing_email: + endPoint: /v1/partnermanager/partners/email/verify + role: partnerrevamp + restMethod: put + inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail + outputTemplate: pms/error + input: '{ + "emailId": "$REMOVE$", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": null + } + ] +}' + Pms_VerifyPartnersEmail_invalid_email: + endPoint: /v1/partnermanager/partners/email/verify + role: partnerrevamp + restMethod: put + inputTemplate: pms/VerifyPartnersEmail/verifyPartnersEmail + outputTemplate: pms/error + input: '{ + "emailId": "gfhgytth", + "requesttime": "$TIMESTAMP$" +}' + output: '{ + "errors": [ + { + "errorCode": "PMS_PRT_012" + } + ] }' \ No newline at end of file diff --git a/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml b/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml index 5f8621db18..7c01e617a2 100644 --- a/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml +++ b/apitest/src/main/resources/pms/partnerPolicyMapping/partnerPolicyMapping.yml @@ -13,4 +13,84 @@ partnerPolicyMapping: "requesttime": "$TIMESTAMP$" }' output: '{ - }' \ No newline at end of file + }' + + Pms_partnerPolicyMapping_invalid_policyName: + endPoint: /v1/partnermanager/partners/111999/policy/map + description: Mapping Partner & Policy when invalid policyname is given + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping + outputTemplate: pms/error + input: '{ + "policyName": "%^776hfgsdf", + "useCaseDescription": "Need to submit the payment", + "requesttime": "$TIMESTAMP$" + }' + output: '{ + "errors": [ + { + "errorCode": "PMS_PRT_073" + } + ] + }' + Pms_partnerPolicyMapping_invalid_partnerId: + endPoint: /v1/partnermanager/partners/1hhggg9/policy/map + description: Mapping Partner & Policy when invalid partnerId is given + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping + outputTemplate: pms/error + input: '{ + "policyName": "mosip policy 19234", + "useCaseDescription": "Need to submit the payment", + "requesttime": "$TIMESTAMP$" + }' + output: '{ + "errors": [ + { + "errorCode": "PMS_PRT_005" + } + ] + }' + Pms_partnerPolicyMapping_missing_policyName: + endPoint: /v1/partnermanager/partners/111999/policy/map + description: Mapping Partner & Policy when policyname is removed from request + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping + outputTemplate: pms/error + input: '{ + "policyName": "$REMOVE$", + "useCaseDescription": "Need to submit the payment", + "requesttime": "$TIMESTAMP$" + }' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + } + ] + }' + Pms_partnerPolicyMapping_missing_useCaseDescription: + endPoint: /v1/partnermanager/partners/111999/policy/map + description: Mapping Partner & Policy when usecaseDescription is removed from request + role: partnerrevamp + checkErrorsOnlyInResponse: true + restMethod: post + inputTemplate: pms/partnerPolicyMapping/partnerPolicyMapping + outputTemplate: pms/error + input: '{ + "policyName": "mosip policy 19234", + "useCaseDescription":"$REMOVE$", + "requesttime": "$TIMESTAMP$" + }' + output: '{ + "errors": [ + { + "errorCode": "PMS_COR_001" + ] + }' \ No newline at end of file diff --git a/apitest/testNgXmlFiles/pmsApi.xml b/apitest/testNgXmlFiles/pmsApi.xml index c061a5bd8b..b695f61852 100644 --- a/apitest/testNgXmlFiles/pmsApi.xml +++ b/apitest/testNgXmlFiles/pmsApi.xml @@ -46,6 +46,29 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -63,6 +95,30 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -131,6 +217,37 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -167,7 +298,31 @@ - + + + + + + + + + + + + + + + + + + + + + + @@ -195,7 +350,13 @@ - + + + + + + @@ -205,4 +366,14 @@ name="io.mosip.testrig.apirig.testscripts.PutWithPathParamsAndBody" /> + + + + + + + + +